Detecting TCP SYN flood attack based on anomaly detection SHC Haris, RB Ahmad, M Ghani 2010 Second international conference on network applications, protocols and …, 2010 | 56 | 2010 |
Anomaly detection of IP header threats SHC Haris, GMW Al-Saadoon, A Ahmad, M Ghani International Journal of Computer Science and Security 4 (5), 497-504, 2011 | 19 | 2011 |
TCP SYN flood detection based on payload analysis SHC Haris, RB Ahmad, M Ghani, GM Waleed 2010 IEEE Student Conference on Research and Development (SCOReD), 149-153, 2010 | 18 | 2010 |
Enhancement and analysis of TFRC performance for real-time data application: a survey MI Ishak, MAHA Ghani, OB Lynn 2010 The 2nd International Conference on Computer and Automation Engineering …, 2010 | 13 | 2010 |
Waveform design for improved range and Doppler resolution in radar F Ghani, SJB Rosli, AHA Ghani, RB Ahmed 2012 Third International Conference on Intelligent Systems Modelling and …, 2012 | 11 | 2012 |
An iterative technique for the design of amplitude and phase modulated pulse trains for radar SJ Rosli, F Ghani, A Hasmani, A Ghani, RB Ahmed Proceeding International Conference Control & Communication Power …, 2013 | 1 | 2013 |
A survey of enhanced hierarchical MIPv6 BL Ong, SY Ang, H Ahmad, MAH Abd Ghani, MF Abd Malik, RB Ahmad IMPACT-2013, 21-25, 2013 | | 2013 |
Synthesis of finite length multi level sequences for clutter rejection in radar R Siti Julia, G Farid, AG Alif Hasmani, R Badlishah Institute of Electrical and Electronics Engineers (IEEE), 2012 | | 2012 |
An overview of TCP analysis over routing protocols in Wireless Mesh Network MAA Ghani, BL Ong, AHA Halim, KM Zaini 2008 International Conference on Electronic Design, 1-5, 2008 | | 2008 |
New Method of Routing Algorithm in Wireless Mesh Networks (WMN) MAH Abd Ghani, RB Ahmad, O Bi-Lynn | | |
Improving Efficiency of Routing Algorithm In Wireless Mesh Network MAHA Ghani, RB Ahmad, O Bi-Lynn | | |
Grid Authentication Mechanisms Survey MAH Abd Ghani, O Bi-Lynn, RB Ahmad, NA Wahab | | |
Performance Study of Block Cipher and Stream Cipher in Real-Time Application Using Embedded System MAA Ghani, MI Ishak, RSM Farook, R Romli, OB Lynn | | |